• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Google Shatters SHA-1 – Daily Security Byte

February 24, 2017 By Corey Nachreiner

SHA-1 is a cryptographic hashing function we use, among other things, to fingerprint sets of digital data, such as files or digital certificates. These functions are designed to output “unique” fingerprints for individual data sets. Over a decade ago, researchers found weaknesses in the SHA-1 implementation that could allow attackers to find “collisions” easier. A collision is when two different data sets have the same hash. At the time, this was a theoretical weakness that experts felt would be impractical in the real world. Even though the research proved it was computationally easier to find collisions, it would still take a very long time.

Thursday, Google and other Dutch researchers released information about their Shattered SHA-1 attack. Essentially, these researchers  have proven that with the right computing infrastructure, well-funded attackers can now practically generate SHA-1 collisions. Watch the video below to learn more about this attack, and what types of systems it could affect.

Episode Runtime: 6:15

Direct YouTube Link: https://www.youtube.com/watch?v=ZaVGtc_xvOE

EPISODE REFERENCES:

  • Researchers page for the Shattered  Attack – Shattered.it
    • Academic whitepaper on the Shattered attack – Shattered.it
    • Easy to parse infographic about Shattered – Shattered.it
  • Great Forbes article explaining the Shattered Attack – Forbes
  • Another article on the SHA-1 attack – Wired
  • What is a hash function? – Wikipedia
  • Decade old article on original SHA-1 weakness discovery –  Schneier.com

— Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Security Bytes Tagged With: Infosec news

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • 3CX Supply Chain Attack
  • Here Come The Regulations

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • 3CX Supply Chain Attack
  • The NSA’s Guidance on Securing Authentication
  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use